Race Condition Affecting kernel-uek-container-debug package, versions <0:5.15.0-310.184.5.2.el9uek


Severity

Recommended
high

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Race Condition vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ORACLE9-KERNELUEKCONTAINERDEBUG-10764783
  • published17 Jul 2025
  • disclosed1 May 2025

Introduced: 1 May 2025

CVE-2025-23151  (opens in a new tab)
CWE-362  (opens in a new tab)

How to fix?

Upgrade Oracle:9 kernel-uek-container-debug to version 0:5.15.0-310.184.5.2.el9uek or higher.
This issue was patched in ELSA-2025-20470.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-uek-container-debug package and not the kernel-uek-container-debug package as distributed by Oracle. See How to fix? for Oracle:9 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

bus: mhi: host: Fix race between unprepare and queue_buf

A client driver may use mhi_unprepare_from_transfer() to quiesce incoming data during the client driver's tear down. The client driver might also be processing data at the same time, resulting in a call to mhi_queue_buf() which will invoke mhi_gen_tre(). If mhi_gen_tre() runs after mhi_unprepare_from_transfer() has torn down the channel, a panic will occur due to an invalid dereference leading to a page fault.

This occurs because mhi_gen_tre() does not verify the channel state after locking it. Fix this by having mhi_gen_tre() confirm the channel state is valid, or return error to avoid accessing deinitialized data.

[mani: added stable tag]

CVSS Base Scores

version 3.1